Vulnerability Description
The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 33.0 |
| Mozilla | Seamonkey | <= 2.30 |
Related Weaknesses (CWE)
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- https://security.gentoo.org/glsa/201504-01
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- https://security.gentoo.org/glsa/201504-01
FAQ
What is CVE-2014-8632?
CVE-2014-8632 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass int...
How severe is CVE-2014-8632?
CVE-2014-8632 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8632?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey.